By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to inject javascript into the web page. This vulnerability affects all versions of Apache CXF prior to 3.4.1 and 3.3.8. Please note that this is a separate issue to CVE-2019-17573.
2020-11-12T13:15:11.353
2024-11-21T05:02:13.623
Modified
CVSSv3.1: 6.1 (MEDIUM)
AV:N/AC:M/Au:N/C:N/I:P/A:N
8.6
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | apache | cxf | < 3.3.8 | Yes |
Application | apache | cxf | < 3.4.1 | Yes |
Application | netapp | snap_creator_framework | - | Yes |
Application | netapp | vasa_provider_for_clustered_data_ontap | ≥ 9.6 | Yes |
Application | oracle | business_intelligence | 5.5.0.0.0 | Yes |
Application | oracle | business_intelligence | 5.9.0.0.0 | Yes |
Application | oracle | business_intelligence | 12.2.1.3.0 | Yes |
Application | oracle | business_intelligence | 12.2.1.4.0 | Yes |
Application | oracle | retail_order_broker_cloud_service | 15.0 | Yes |
Operating System | oracle | communications_messaging_server | 8.0.2 | Yes |
Operating System | oracle | communications_messaging_server | 8.1 | Yes |